Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
Over the past few years, the demand for data traffic has experienced explosive growth thanks to the increasing need to stay online. New applications of communications, such as wearable devices, autonomous systems, drones, and the Internet of Things (IoT), continue to emerge and generate even more data traffic with vastly different performance requirements. With the COVID-19 pandemic, the need to stay online has become even more crucial, as most of the fields, would they be industrial, educational, economic, or service-oriented, had to go online as best as they can. As the data traffic is expected to continuously strain the capacity of future communication networks, these networks need to evolve consistently in order to keep up with the growth of data traffic. Thus, more intelligent processing, operation, and optimization will be needed for tomorrow’s communication networks. The Sixth Generation (6G) technology is latest approach for mobile systems or edge devices in terms of reduce traffic congestions, energy consumption blending with IoT devices applications. The 6G network works beyond the 5G (B5G), where we can use various platforms as an application e.g. fog computing enabled IoT networks, Intelligent techniques for SDN network, 6G enabled healthcare industry, energy aware location management. Still this technology must resolve few challenges like security, IoT enabled trust network. This book will focus on the use of AI/ML-based techniques to solve issues related to 6G enabled networks, their layers, as well as their applications. It will be a collection of original contributions regarding state-of-the-art AI/ML-based solutions for signal detection, channel modeling, resource optimization, routing protocol design, transport layer optimization, user/application behavior prediction 6G enabled software-defined networking, congestion control, communication network optimization, security, and anomaly detection. The proposed edited book emphasis on the 6G network blended with Fog-IoT networks to introduce its applications and future perspectives that helps the researcher to apply this technique in their domain and it may also helpful to resolve the challenges and future opportunities with 6G networks.
This book constitutes the proceedings of the 6th International Workshop on Traffic Monitoring and Analysis, TMA 2014, held in London, UK, in April 2014. The thoroughly refereed 11 full papers presented in this volume were carefully reviewed and selected from 30 submissions. The contributions are organized in topical sections on tools and lessons learned from passive measurement, performance at the edge and Web, content and inter domain.
This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference. The workshop is an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks." The 10 revised full papers and 6 poster papers presented together with 4 short papers were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on traffic analysis, applications and privacy, traffic classification, and a poster session.
This book constitutes the refereed proceedings of the 10th International Conference on Passive and Active Measurement, PAM 2009, held in Seoul, Korea, in April 2009. The 22 revised full papers and 2 revised demo papers presented were carefully reviewed and selected from 77 submissions. The papers focus on research and practical applications of routing and forwarding, topology and delay, methods for large-scale measurements, wireless, management tools, audio and video traffic, peer-to-peer, traffic measurements, and measurements of anomalous and unwanted traffic.
The 2008 edition of the Passive and Active Measurement Conference was the ninth of a series of successful events. Since 2000, the Passive and Active M- surement (PAM) conference has provided a forum for presenting and discussing innovative and early work in the area of Internet measurement. PAM has a tradition of being a workshop-like conference with lively discussion and active participation from all attendees. This event focuses on research and practical applications of network measurement and analysis techniques. This year's c- ference was held in Cleveland, Ohio. PAM2008's call for papers attracted 71 submissions. Each paper was ca- fully reviewed by at least three members of the Technical Program Committee. The reviewing process led to the acceptance of 23 papers. The papers were - ranged into eight sessions covering the following areas: addressing and topology, applications,classi?cationandsampling,measurementsystems andframeworks, wireless 802.11, tools, characterization and trends, and malware and anomalies. We are very grateful to Endace, Intel and Cisco Systems whose sponsoring allowed us to keep low registration costs and also to o?er several travel grants to PhD students. We are also grateful to Case Western Reserve University for sponsoring PAM as a host.
This book constitutes the refereed proceedings of the 8th International Conference on Passive and Active Measurement, PAM 2007, held in Louvain-la-Neuve, Belgium, in April 2007. The 21 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 80 submissions. The papers focus on research and practical applications of network measurement and analysis techniques and are organized in topical sections on interdomain routing, P2P, wireless 802.11, wireless 3G/CDMA/Bluetooth, infrastructure and services, traffic, and measurement principles.
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017. The 20 full papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on IPv6, Web and applications, security, performance, latency, characterization and troubleshooting, and wireless.
Due to concerns about resilience and performance, more and more stub networks in the Internet rely on multi-homing. Multi-homing consists in connecting a network to the Internet at different access points. As traffic leaves and enters the network through several access links, multi-homed networks need to control their traffic, also called traffic engineering. Multi-homed networks typically perform traffic engineering by tweaking the BGP routing protocol. The purpose of BGP is to distribute the information about reachable networks across the whole Internet, not to perform traffic engineering. It is thus important for multi-homed networks to know the complexity of traffic engineering with BGP. In this book, we explain how BGP can be used to engineer the traffic and what can be expected from doing it. The content of this book targets two types of readers. First, the network managers of small to medium-size stub networks will better understand BGP and how to use it to engineer their traffic. Second, researchers in networking will learn about three different research areas: Internet traffic characteristics, interdomain routing, and evolutionary optimization.
|
You may like...
|